DESKTOP AUTHORITY AND MICROSOFT SYSTEMS MANAGEMENT SERVER

Size: px
Start display at page:

Download "DESKTOP AUTHORITY AND MICROSOFT SYSTEMS MANAGEMENT SERVER"

Transcription

1 S O L U T I O N S DESKTOP AUTHORITY AND MICROSOFT SYSTEMS MANAGEMENT SERVER A ScriptLogic Product Positioning Whitepaper NICK CAVALANCIA w w w. s c r i p t l o g i c. c o m

2 INTRODUCTION Enterprise network administrators often express a need for a solution that manages every PC on their network. The solution needs to not only collect inventory information for improved decision-making, but must also allow administrators to centrally configure workstations and servers. If the solution does its job well, a user s PC should behave like a network appliance in which desktop configuration is achieved using the enterprise management solution. A number of companies have developed products to provide such a solution; in this paper two products are compared: Microsoft Systems Management Server (SMS) 2003 and ScriptLogic s Desktop Authority. EXECUTIVE SUMMARY SMS 2003 and Desktop Authority overlap in some functional areas, but actually have quite different areas of focus within an overall enterprise management system. SMS 2003 has superior functions focused solely around application, hot fix and Service Pack deployment. Using SMS for desktop administration and configuration, however, requires skilled and trained administrators to spend considerable time writing and testing scripts. The strengths of Desktop Authority are its short learning curve, instant access to all common desktop administration When evaluating these enterprise management products, customers often notice that SMS and Desktop Authority offer some overlapping features. Indeed, both assist with network information collection and software deployment. However, SMS and Desktop Authority meet enterprise management needs from very different perspectives, and are more complementary than competing. This white paper demonstrates that Desktop Authority provides all the functionality needed to administer the vast majority of enterprise networks, and that in some cases, the granularity of information collected by SMS (as well as its built-in remote control feature) makes it an excellent complement to Desktop Authority. Three key areas of comparison are covered: Product Architecture, Client Management Features, and Cost of Ownership. functions, highly flexible Validation Logic, and extensive Remote Management capabilities. Desktop Authority is extremely cost-effective, requires no formal training to use, and is suitable for companies of all sizes. Ideal candidates for Desktop Authority are organizations that need extensive network management, inventory reporting, and enhanced software deployment capabilities. Organizations that can justify the higher purchase and setup costs of SMS should also consider Desktop Authority. This document provides a comparison of the features found in these products, and attempts to highlight areas where the capabilities of the products differ significantly. Throughout this whitepaper, comparison grids are used to demonstrate these concepts visually. The comparison grid follows this legend: COMPARISON LEGEND Supported feature of the product. No scripting is required. Supported feature of the product. The product's infrastructure was designed to facilitate this task, but scripting will be required. The product could conceivably be used to facilitate this task, but probably isn't the best solution. A great deal of scripting will be required and reliability and/or performance may be less than adequate. The product does not natively support this task or feature. 2

3 PRODUCT ARCHITECTURE This section compares the architectures of SMS 2003 and Desktop Authority, focusing on the client operating systems supported, the methods used to discover information about clients, and the location and storage requirements for the collected information. Which Operating Systems are Supported? SMS 2003 and Desktop Authority both require a Windows NT 4.0 or Active Directory domain. Typically, Desktop Authority is installed on a domain controller (note: installing Desktop Authority to a domain controller is not a requirement). Generally, SMS 2003 is installed on a dedicated standalone, or member server, and requires an available SQL server to store configuration information. This SQL server is generally installed on the same physical computer, but can reside on a separate machine, if required. SMS 2003 must be installed on a Windows 2000 SP3 or higher server, but is compatible with NT 4.0 or Active Directory domains. SMS 2003 is optimized to manage Windows 2000 and higher clients using its Advanced client software. Windows NT 4.0 SP6a and Windows 98 clients are still supported with the Legacy SMS client software, but certain new SMS 2003 features such as roaming are not available. Since Desktop Authority runs on the network s domain controllers, its management subdivisions closely follow the NT or Active Directory Domain structure. The SMS 2003 architecture is subdivided based on IP Subnets or Active Directory Sites. Discovering Your Enterprise The task of deploying the SMS 2003 client software is divided into two processes: Client Discovery and Client Installation. Client Discovery is the process by which SMS locates resources on the network, and Client Installation is the process by which a client agent is installed on the computer to be managed. Client Discovery is accomplished in several ways with SMS: Network Discovery, Logon Discovery, and Active Directory Discovery. With Network Discovery, SMS polls NT Domains, IP subnets, SNMP-enabled devices, such as routers and switches, and Microsoft DHCP Server databases to generate a list of detected subnets and resources on the network. This list of discovery records is stored in the SMS database on a specified interval, and includes both Windows and non- Windows computer systems, and IP devices, such as routers and printers. SMS also can add a discovery record to the SMS database when a client computer runs a specific script (possibly at logon or system startup). The new SMS 2003 Active Directory Discovery method downloads all computer objects, OUs, and users accounts into the SMS database on a regular schedule; in large environments, the scope of Active Directory Discovery can be restricted with LDAP queries that target only specific containers. Because Desktop Authority collects all information and configures its clients at logon and logoff, it doesn t require a discovery process. Both SMS and Desktop Authority support automatic installation of their respective clients during the logon process. They use the same basic method of bypassing the low-rights user problem; the server logs onto the client and installs the agent remotely, using an administrative account. The SMS Client Software generally is installed on all servers and workstations; the Desktop Authority client software generally is installed only on those desktops that are to be centrally managed. The SMS 2003 Advanced Client installer is Windows Installer-based (MSI) so it can be installed using Group Policy as well as by system startup script/logon script. SMS also has a Client Push Installation feature that detects new NT/2000/XP/Server 2003 computers as they are added to the SMS database and remotely installs the SMS client without a user logging in or logging off. This is very handy for servers or in environments where users suspend their computers at night, or never log off and back on. An administrator can enable or disable Client Push Installation for workstations, servers, or domain controllers. Note that Client Push Installation is not available for Windows 98 computers due to limitations of the operating system. Since Desktop Authority performs its desktop management functions during the logon and logoff processes, a Client Push Installation feature is not necessary. 3

4 Discovery and Client Installation Feature Desktop Authority SMS Network Discovery Logon Discovery Logon Client Installation Remote Client Installation (logon not required) Automatically Modifies Logon Scripts Client Rollout is controlled with Validation Logic Where Do You Keep Your Data? Both SMS and Desktop Authority are database-driven. With SMS, all available information about servers and workstations, including hardware and software inventory data, is stored in the SMS database hosted by SQL Server. Everything that SMS does is related to this discovered data in some way. Likewise, all of Desktop Authority's systems management instructions are stored first in a centralized SQL database and then are generated as files on the network's domain controller servers. SMS 2003 offers web reporting functionality with over 140 built-in reports that cover everything from computer hardware configuration to software update compliance. New custom reports can be created by anyone with experience writing standard SQL statements. Desktop Authority utilizes over 100 built-in reports with the ability to also generate custom reports. Architecture Comparison Design / Platform Support Desktop Authority SMS Runs on Windows NT 4.0, Windows 2000 and 2003 servers Requires SQL Server / MSDE Manages all 32-bit Windows clients Windows 95 through XP Manages all 16-bit Windows clients Windows 3.1, WFW 3.11 Architecture based on NT or Active Directory domain structure Architecture based on IP or IPX subnets 4

5 CLIENT MANAGEMENT This section looks at the features that each product offers to centrally configure workstations. Focus is on the management areas of desktop configuration, remote control, inventory logging, and software distribution. Defining your Desktops It may be surprising, but SMS 2003 actually provides very few out-of-the-box client configuration capabilities other than the patch management functionality. SMS is intended mainly as a platform or infrastructure product; almost all client-side changes must be done with custom-written scripts deployed using the SMS Software Distribution feature. Scripts must be researched, developed, tested, piloted, and finally moved into production, which means that to truly benefit from an SMS implementation, one or more skilled scripters and testers is required. From a desktop configuration perspective, SMS could be described as a development platform which trained and skilled administrators can use to generate scripts that perform specific administration tasks. SMS allows administrators to target computers by creating collections in the SMS database. A collection can contain a list of machines directly specified by the administrator, or it can be based on a query to the SMS database. Collection memberships are evaluated on a regular basis, which allows an action to be taken on machines when they first meet particular criteria. For instance, if a particular application were advertised to a collection of all machines with 256 MB of RAM, SMS would not install the application on a PC with 128 MB of RAM. If that same PC were later upgraded to 256 MB of RAM, the computer would become a member of that collection, and SMS would install the application. Similarly, Desktop Authority can accomplish the same end result (only launching an application on machines with 256MB of RAM) without the need for a collection using their exclusive Validation Logic along with Custom Validations, because the determination of whether the client meets the criteria to launch an application is performed at logon, rather than based on a potentially outdated value in a configuration database. Desktop Authority provides a wealth of out-of-the-box desktop configuration options including network drive and printer mappings, Internet Explorer settings, Microsoft Office setting standardization, Outlook Profile Management, File Management, and many more. Each configuration element includes Validation Logic to ensure that each desktop is configured correctly. Validation Logic empowers the administrator to apply a specific setting to users or computers matching specific criteria, such as mapping a printer for members of a specific domain group or OU, or even sending software to only those computers with a certain speed processor. The best part is that all of these changes can be made easily within the Desktop Authority Manager interface without requiring the administrator to do any scripting. Desktop Authority s Validation Logic provides an impressive number of options (as shown in Figure 1) covering Class of machine, OS, connection type, and 25 other criteria. Figure 1: Validation Logic 5

6 Desktop Authority isn t just limited to a single selection criteria. Validation Logic supports the use of wildcard values to extend the scope of a particular selection. For example, a TCP/IP Address value of * would allow any machine on that IP subnet to pass the validation and accept the configuration change specified. When required, multiple criteria can be combined with AND/OR logic for each configuration entry within Desktop Authority, resulting in an exponentially granular selection. Desktop Authority and SMS 2003 have similar targeting capabilities, but in practice they are quite different. With SMS, the validation is run from the database on the server rather than evaluated on the client at run time. This has the advantage of allowing the administrator to immediately see and report on the targeted population of computers for a particular deployment, but is only as current as the last time the client reported its inventory data. Desktop Authority s Validation Logic will act always upon the current state of the machine, but the administrator cannot report necessarily on the target population ahead of time. The benefit of evaluating clients at logon time is that there is never the issue of an out-of-date database, so immediately after a configuration change is defined within Desktop Authority; clients logging on will implement the change. Client Management Desktop Authority SMS Action can be taken based on hardware or software Natively maps network drives and printers Natively supports Internet Explorer and MS Office Configuration Natively supports MS Outlook Profile Management Natively supports Security Policy Management Natively supports Desktop Shortcut Management Natively supports File System Management Natively supports Displaying Logos and Messages at Logon Natively supports Registry and File Permissions Management Natively supports Password and Drive Space Warnings Natively supports Modifying Registry Settings Natively supports enterprise Anti-Spyware Management Natively supports enterprise Patch Management Natively supports Power Management Remotely Accessible Clients SMS includes a remote control product that allows an administrator to view the screen and control the mouse and keyboard of a remote Windows computer. In addition, the Remote Control client has file transfer and remote execute functionality, even on Windows 98 clients with file sharing turned off. SMS Remote Control also supports an Ask User for Permission requirement. Remote Control installation is either enabled or disabled on a site-wide basis and cannot be limited to workstations only or according to some other company-specific requirement without performing custom scripting or configuring additional SMS sites. SMS 2003 remote control can be configured to not install on computers that support Microsoft s Remote Desktop technology this includes Windows 2000 Server, Windows XP Professional, and Windows Server 2003 systems. For these computers, SMS defaults to the built-in Remote Desktop and Remote Assistance functionality. 6

7 Desktop Authority's remote client is not referred to as a Remote Control client because Desktop Authority's client does so much more than just remote control, so it is referred to as a Remote Management client. In addition to basic remote control, Desktop Authority's remote client provides administrators with comprehensive management of desktops including: > Services, Processes and Drivers > Open Files, DLLs and Registry Keys in use > Edit File Systems and the Registry > Tasks and Alerts > Installed Applications > Remote Reboots Desktop Authority does not require a specific application to remotely manage desktops; as any standard java-enabled browser can be used. In addition, security levels can be established to limit specified groups of administrators to specific functions with Desktop Authority s Remote Management client. Figure 2 shows the Desktop Authority remote client managing a desktop. Notice the comprehensive list of management capabilities at the left in addition to remotely controlling the desktop. Desktop Authority's client also can be selectively deployed using the same validation logic used for desktop configuration, administrators can choose which desktops and servers will have the remote client installed. Figure 2: Desktop Authority s Remote Management Client Inventorying your Desktops One of the most useful features of SMS is the inventory database. Hardware and software information for all Windows computers on the network including servers is available for ad-hoc query and reporting, or for taking administrative action such as running a script. Desktop Authority utilizes two databases one for storing the desktop configurations and a second for reporting. The configuration database is used when changes are made to a configuration element within the Desktop Authority Manager. The reporting database would be the closest equivalent to SMS, in that it contains hardware and software inventory information. 7

8 Software Distribution One of the most significant capabilities that a systems management infrastructure enables is software distribution. With automated software distribution, an enterprise can cut the immediate costs associated with technicians visiting and manually installing new software and patches on each computer involved in a rollout. In addition, centralized deployments help to ensure that each corporate computer is configured identically, which decreases support costs after a rollout is complete. Both SMS and Desktop Authority support software distribution through MSI packaging. Packages can have user interaction, but more often are configured for quiet or silent installs, meaning that the package is pre-programmed with all of the required information. In an SMS environment, packages are often built using the SMS Installer, which is actually a simple programming language entirely geared toward the task of installing applications on a computer. SMS Installer creates a package by compiling all of the files and configuration information necessary to complete an install into a single executable. SMS Installer is included with SMS and is reasonably good at scripting most installations. Desktop Authority does not include a free packaging tool like SMS Installer, but does fully support third-party products such as Wise Package Studio or Install Shield AdminStudio. Also, many vendors now provide their setup programs in the MSI (Microsoft Installer) format, which is inherently scriptable and thus reduces the need for SMS Installer repackaging. Desktop Authority provides a growing library of supported install scripts for common applications such as anti-virus suites, Adobe Acrobat, and Internet Explorer. Many Desktop Authority-provided install scripts support packages that require a second administrative logon after a reboot, such as Internet Explorer 6. Microsoft provides no such repository for install scripts optimized for SMS. While Microsoft does offer notes on how to script installs of many of its own products, including those that require an administrative logon after reboot, they generally rely on the system administrator to actually write and test the script. For example, when installing an application that was accomplished in two sections (with a reboot in the middle), an SMS script would have to be written to use the Elevated Rights Deployment tool available in the SMS 2003 Feature Pack. When properly configured, this tool performs the actions required after the reboot using administrative rights. Desktop Authority would handle the same scenario with the ScriptLogic service performing the first part of the install and starting a hidden instance of Explorer after the reboot to process the second half of the install under the context of the local Admin. This prevents the need to perform registry modifications and a logon and logoff to complete the install. Both SMS and Desktop Authority offer a large variety of software deployment options to the system administrator. Both platforms can run install scripts that require administrator rights, even if the currently logged-on user is not an administrator. In addition, while the implementation differs somewhat, both can distribute software based on system configuration data, such as the presence of file or hardware information. SMS can install software without a user ever logging on to a computer; Desktop Authority does not support this feature because installation instructions are not scheduled, but performed at logon. SMS also allows user-initiated optional software installations via a control panel applet or Systray icon, which Desktop Authority does not support. Desktop Authority supports running applications at logon, logoff, or shutdown. To ensure these three events occur when needed, Desktop Authority employs an inactivity timer. This locally running application watches for the presence of keyboard and mouse movement. Specific times can be monitored and administrators have the option of logging off the user, restarting the machine, or locking the desktop. This too can selectively be done using Validation Logic. By forcing a logoff or shutdown/restart following a period of inactivity, Desktop Authority can trigger deployment of one or more applications. SMS 2003 supports MSI source tracking functionality. A common problem with Windows Installer applications is that they often require access to the original media when they are patched, repaired, upgraded, or uninstalled. SMS can migrate user computers from the original install locations of applications (generally a server that is old or doesn t exist anymore, or a local CD-ROM drive when the user does not have the compact disc) to the SMS distribution points. As the SMS distribution points are created/moved/deleted, the clients update their MSI source location information automatically. For low-bandwidth users, SMS supports drizzle-based deployments using a technology called Background Intelligent Transfer Services (BITS). This technology allows software to be slowly downloaded to a local cache on a machine before it is executed. The download process supports checkpointrestart and is bandwidth aware to provide compatibility with intermittent and slow connections, respectively. This technology is also useful for packages or scripts that are run on clients on a regular basis. SMS can automatically cache such packages on client computers and run them locally rather than always having to download them from across the network. SMS also allows administrators to specify particular Active Directory Sites or IP subnets as local or remote boundaries. For each advertised program, the SMS administrator can choose the behavior for clients that are local and clients that are remote. By default, local clients 8

9 install applications directly from the distribution point and remote clients do not install the application at all, but rather wait until they are local. These behaviors can each be changed to Download and Run or remote clients can be set to Run the program directly from the Distribution Point. Software Distribution In addition to software distribution, Desktop Authority includes an optional Patch Deployment for Desktops option that downloads, distributes and deploys Microsoft patches for both its Operating Systems and applications. This functionality, combined with Desktop Authority s exclusive Validation Logic gives administrators maximum control over the patch deployment process. Feature Desktop Authority SMS Supports Software Distribution Includes a Packaging Tool Supports Third-Party Packaging Tools Provides Supported Install Scripts Includes Patch Management Installs Software with Admin Rights Installs Software based on Computer Configuration Supports installs at Logon and Logoff, and Shutdown Supports installs based on a schedule (e.g.: start at 6pm) READY FOR WINDOWS XP SP2 SMS 2003 can be used to automatically roll-out Windows XP Service Pack 2 using the standard package definition file mechanism that SMS uses for all service packs and hotfixes. Desktop Authority too has the same ability to roll out Windows XP SP2 using its Application Launcher, but Desktop Authority also provides the administrator with options to centrally configure SP2 s security enhancements. The biggest concern for corporate users deploying SP2 is the Windows Firewall. With the default setting of an enabled firewall, all remote access to your Windows XP-based workstation is blocked. Desktop Authority has built-in support to open and close ports blocked by the Windows Firewall, as well as a custom script to enable (or disable) the Windows Firewall. COST OF OWNERSHIP This last section highlights some areas that compose the cost of owning SMS and ScriptLogic: support, licensing models, and pricing. Support Options The first level of support should be your own staff. Supporting SMS requires classroom training and generally requires the assistance of Microsoft Consulting Services to get things up and running. Desktop Authority, on the other hand, requires neither classroom training, nor consulting to implement. There are several support options available for both SMS and Desktop Authority beyond your own staff. Each software product has a collection of FAQs, Whitepapers, and Knowledge Base articles available on the company s website. In addition, each product can take advantage of the thriving 9

10 System-Scripting communities on the web, and of the growing SMS and KiXtart-specific communities. Microsoft offers toll-free 24x7 telephone support for SMS on a Pay-Per- Incident basis; the fee is waived if a bug in the product caused the issue. ScriptLogic offers toll-call telephone support from 7 am to 7 pm EST, Monday through Friday. Support Options Desktop Authority SMS Online Support: Web site, FAQs, Whitepapers, KB articles General scripting and product-specific communities Standard telephone support 7am 7pm 2 4 x 7 Annual support contracts Fee-based support incidents Licensing and Pricing Both products require that a Client Access License (CAL) be purchased for each computer using the product. In addition to CALs, SMS, like other BackOffice products from Microsoft, requires the purchase of a minimum of one SMS Server License and one SQL Server License per primary site server, however SMS 2003 now supports an SMS 2003 with SQL Technology license, which offers a deep discount on the SQL Server product, but has the soft restriction that the copy of SQL Server is to be used only to host the SMS database. If the enterprise architecture calls for more than one primary site (1000+ computers in a single location), additional SMS 2003 with SQL Technology licenses are required. Secondary sites (fewer than 1000 computers in a single location) no longer require additional SMS server licenses, though SMS client CALs are still required. Note that many larger companies with a Microsoft Enterprise Agreement are already paying for SMS client licenses but are not using them. Unlike SMS, Desktop Authority licensing is based solely on the number of desktops (not users) to be managed and only optionally requires licenses for SQL Servers if you choose not to use MSDE to store your data, or servers hosting Desktop Authority services. A maintenance plan is available from ScriptLogic for two or three additional years that includes product updates and priority technical support at an additional cost. Nonetheless, SMS 2003 can be roughly four to five times more expensive than Desktop Authority in similar environments, even with the three-year Desktop Authority maintenance option factored in. SUMMARY SMS 2003 and Desktop Authority each have a place in a wellmanaged Windows environment. While there is overlap in features between the products, their core strengths are quite complementary: SMS features a robust software distribution and software updates methodology, while Desktop Authority has an intuitive set of no-scripting-required desktop administration features with highly granular Validation Logic. All organizations with Windows desktops can benefit by implementing Desktop Authority as a healthy first step toward a managed network environment. Companies who feel that the additional features of SMS such as more granular software deployment capabilities are desirable should choose to implement both products. For information on Desktop Authority or other ScriptLogic software solutions, contact your authorized reseller or contact your ScriptLo gic representative at:

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

Desktop Authority and Group Policy Preferences

Desktop Authority and Group Policy Preferences Desktop Authority and Group Policy Preferences A ScriptLogic Product Positioning Paper 1.800.813.6415 www.scriptlogic.com Desktop Authority and Group Policy Preferences Introduction Group Policy Preferences

More information

LEARNING SOLUTIONS website milner.com/learning email training@milner.com phone 800 875 5042

LEARNING SOLUTIONS website milner.com/learning email training@milner.com phone 800 875 5042 Course 6451B: Planning, Deploying and Managing Microsoft System Center Configuration Manager 2007 Length: 3 Days Published: June 29, 2012 Language(s): English Audience(s): IT Professionals Level: 300 Technology:

More information

MSP Center Plus Features Checklist

MSP Center Plus Features Checklist Features Checklist Your evaluation is not complete until you check out top vendors and the price. Here is a list prepared based customer queries. Features General Easy web interface with admin, technician,

More information

Getting Started Guide

Getting Started Guide Getting Started Guide Contacting ScriptLogic Contacting ScriptLogic ScriptLogic may be contacted about any questions, problems or concerns you might have at: ScriptLogic Corporation 6000 Broken Sound Parkway

More information

RES ONE Automation 2015 Task Overview

RES ONE Automation 2015 Task Overview RES ONE Automation 2015 Task Overview Task Overview RES ONE Automation 2015 Configuration Tasks The library Configuration contains Tasks that relate to the configuration of a computer, such as applying

More information

FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO

FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO Copyright 2005 Shavlik Technologies. All rights reserved. No part of this document may be reproduced or retransmitted in

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

MCTS Guide to Microsoft Windows 7. Chapter 13 Enterprise Computing

MCTS Guide to Microsoft Windows 7. Chapter 13 Enterprise Computing MCTS Guide to Microsoft Windows 7 Chapter 13 Enterprise Computing Objectives Understand Active Directory Use Group Policy to control Windows 7 Control device installation with Group Policy settings Plan

More information

System Center Configuration Manager 2007

System Center Configuration Manager 2007 System Center Configuration Manager 2007 Software Distribution Guide Friday, 26 February 2010 Version 1.0.0.0 Baseline Prepared by Microsoft Copyright This document and/or software ( this Content ) has

More information

New Boundary Technologies, Inc. 1300 Godward Street N.E. Suite 3100 Minneapolis, MN 55413

New Boundary Technologies, Inc. 1300 Godward Street N.E. Suite 3100 Minneapolis, MN 55413 Trademarks & Patents Prism Suite Quick Start Guide published June, 2011 This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein;

More information

Print Audit 6 Network Installation Guide

Print Audit 6 Network Installation Guide Print Audit 6 Network Installation Guide IMPORTANT: READ THIS BEFORE PERFORMING A PRINT AUDIT 6 INSTALLATION Print Audit 6 is a desktop application that you must install on every computer where you want

More information

Installation Guide for LynxClient

Installation Guide for LynxClient Installation Guide for LynxClient Technical Support: 972-231-6874 Ext. 140 8am to 5pm CST Email: lynx@mitsi.com PC Keyboard Duress Button LynxKey & LynxKeyPro USB Duress Button LynxUSB Notification Popup

More information

7.x Upgrade Instructions. 2015 Software Pursuits, Inc.

7.x Upgrade Instructions. 2015 Software Pursuits, Inc. 7.x Upgrade Instructions 2015 Table of Contents INTRODUCTION...2 SYSTEM REQUIREMENTS FOR SURESYNC 7...2 CONSIDERATIONS BEFORE UPGRADING...3 TERMINOLOGY CHANGES... 4 Relation Renamed to Job... 4 SPIAgent

More information

Goverlan Remote Control

Goverlan Remote Control Goverlan Remote Control Feature Overview Goverlan Remote Control Powerful IT remote control, made easy Support, control and manage multiple users anywhere securely and seamlessly. With its powerful broadscope

More information

Desktop Authority vs. Group Policy Preferences

Desktop Authority vs. Group Policy Preferences Desktop Authority vs. Group Policy Preferences A Comparison of Desktop Lifecycle Management Features Introduction Group Policy Preferences In Windows Server 2008 and Windows Vista Service Pack 1, Microsoft

More information

Managing Windows Environments with Group Policy

Managing Windows Environments with Group Policy 3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: rwhitney@discoveritt.com Web: www.discoveritt.com Managing Windows Environments with Group Policy Course: MS50255C

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of

More information

Advanced Diploma In Hardware, Networking & Server Configuration

Advanced Diploma In Hardware, Networking & Server Configuration Advanced Diploma In Hardware, Networking & Server Configuration Who should do this course? This course is meant for those persons who have a dream of getting job based on Computer Hardware, Networking

More information

Version 3.8. Installation Guide

Version 3.8. Installation Guide Version 3.8 Installation Guide Copyright 2007 Jetro Platforms, Ltd. All rights reserved. This document is being furnished by Jetro Platforms for information purposes only to licensed users of the Jetro

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

Microsoft Windows Server Update Services Questions & Answers About The Product

Microsoft Windows Server Update Services Questions & Answers About The Product Microsoft Windows Server Update Services Questions & Answers About The Product General Information Q. What is Windows Server Update Services (WSUS)? A. WSUS (previously called Windows Update Services)

More information

Microsoft Windows 2000 Terminal Services

Microsoft Windows 2000 Terminal Services Operating System Microsoft Windows 2000 Terminal Services Licensing Technology White Paper Abstract This white paper provides an introduction to Terminal Services Licensing, the client license management

More information

MAPILab Reports for Hardware and Software Inventory Installation Guide. Document version 1.0

MAPILab Reports for Hardware and Software Inventory Installation Guide. Document version 1.0 MAPILab Reports for Hardware and Software Inventory Installation Guide Document version 1.0 MAPILab Ltd., January 2010 Table of Contents Introduction... 3 1. Product architecture and general explanations...

More information

Installation Notes for Outpost Network Security (ONS) version 3.2

Installation Notes for Outpost Network Security (ONS) version 3.2 Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...

More information

This document is intended to make you familiar with the ServersCheck Monitoring Appliance

This document is intended to make you familiar with the ServersCheck Monitoring Appliance ServersCheck Monitoring Appliance Quick Overview This document is intended to make you familiar with the ServersCheck Monitoring Appliance Although it is possible, we highly recommend not to install other

More information

Websense Support Webinar: Questions and Answers

Websense Support Webinar: Questions and Answers Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

Special Edition for FastTrack Software

Special Edition for FastTrack Software 08/14 The magazine for professional system and networkadministration Special Edition for FastTrack Software Tested: FastTrack Automation Studio www.it-administrator.com TESTS I FastTrack Automation Studio

More information

Virtual Application Management with Microsoft Application Virtualization 4.6 and System Center 2012 Configuration Manager

Virtual Application Management with Microsoft Application Virtualization 4.6 and System Center 2012 Configuration Manager Virtual Application Management with Microsoft Application Virtualization 4.6 and System Center 2012 Configuration Manager This whitepaper describes the virtual application management capabilities provided

More information

Automated Patching. Paul Asadoorian IT Security Specialist Brown University

Automated Patching. Paul Asadoorian IT Security Specialist Brown University Automated Patching Paul Asadoorian IT Security Specialist Brown University Outline Automated Patching Introduction Tools from Microsoft Microsoft SUS Microsoft SMS Others HFNetCheck Pro (Shavlik) Novell

More information

HP Client Automation Standard Fast Track guide

HP Client Automation Standard Fast Track guide HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation

More information

ATD NEWS SOFTWARE NETWORKING / DATABASE FAQs... 2 Database Issues:... 2 Q: What are the system requirements for installing MSDE server?...

ATD NEWS SOFTWARE NETWORKING / DATABASE FAQs... 2 Database Issues:... 2 Q: What are the system requirements for installing MSDE server?... ATD NEWS SOFTWARE NETWORKING / DATABASE FAQs... 2 Database Issues:... 2 Q: What are the system requirements for installing MSDE server?... 2 Q: What is networking support offered by MSDE?... 2 Q: What

More information

Acknowledgments Primary and Secondary Site Server Installation p. 1 Installation Requirements p. 2 Server Operating System p. 2 SQL Server p.

Acknowledgments Primary and Secondary Site Server Installation p. 1 Installation Requirements p. 2 Server Operating System p. 2 SQL Server p. Acknowledgments p. iii Primary and Secondary Site Server Installation p. 1 Installation Requirements p. 2 Server Operating System p. 2 SQL Server p. 3 Internet Explorer p. 4 MDAC p. 4 NTFS File System

More information

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Symantec AntiVirus Corporate Edition Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 10223881 Symantec and the Symantec logo are U.S. registered trademarks

More information

Table of Contents. FleetSoft Installation Guide

Table of Contents. FleetSoft Installation Guide FleetSoft Installation Guide Table of Contents FleetSoft Installation Guide... 1 Minimum System Requirements... 2 Installation Notes... 3 Frequently Asked Questions... 4 Deployment Overview... 6 Automating

More information

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11 2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information

More information

Enterprise Remote Control 5.6 Manual

Enterprise Remote Control 5.6 Manual Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote

More information

LT Auditor+ for Windows

LT Auditor+ for Windows LT Auditor+ for Windows Quick Start Guide Documentation issue: 5.3 Copyright Blue Lance Inc. Distributed by: LT Auditor+ for Windows: Overview LT Auditor+ is a security software application that provides

More information

Active Directory Integration

Active Directory Integration January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process

More information

NetWrix USB Blocker. Version 3.6 Administrator Guide

NetWrix USB Blocker. Version 3.6 Administrator Guide NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

Snow Distribution White Paper Version 4.0

Snow Distribution White Paper Version 4.0 Snow Distribution White Paper Version 4.0 Snow Software AB 2002 Snow Software Snow Software develops and provides software that substantially improves cost efficiency and control over software and licenses

More information

System Planning, Deployment, and Best Practices Guide

System Planning, Deployment, and Best Practices Guide www.novell.com/documentation System Planning, Deployment, and Best Practices Guide ZENworks Application Virtualization 9.0 February 22, 2012 Legal Notices Novell, Inc., makes no representations or warranties

More information

Getting started. Symantec AntiVirus Business Pack. About Symantec AntiVirus. Where to find information

Getting started. Symantec AntiVirus Business Pack. About Symantec AntiVirus. Where to find information Getting started Symantec AntiVirus Business Pack Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 Symantec and the Symantec logo are U.S. registered trademarks of Symantec

More information

Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL. Installation and System Administrator's Guide 4MASIN450-08

Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL. Installation and System Administrator's Guide 4MASIN450-08 Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL Installation and System Administrator's Guide 4MASIN450-08 2011 Sage Software, Inc. All rights reserved. Sage, the Sage logos and the Sage product

More information

SCCM 2012. How to guide deploying SCCM Client, setting up SUP and SCEP. Hans Chr. Andersen

SCCM 2012. How to guide deploying SCCM Client, setting up SUP and SCEP. Hans Chr. Andersen SCCM 2012 How to guide deploying SCCM Client, setting up SUP and SCEP Hans Chr. Andersen Contents What is Configuration Manager?... 2 Deploying SCCM Client... 3 Client push Installation... 3 SUP Installation...

More information

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) ( SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies

More information

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION Contents 1. Getting Started... 4 1.1 Specops Deploy Supported Configurations... 4 2. Specops Deploy and Active Directory...5 3. Specops Deploy

More information

Wyse Device Manager TM

Wyse Device Manager TM Wyse Device Manager TM Secure, flexible and effective thin client management software All youneed toknow.here. An introduction to Wyse Device Manager TM Minimize your desktop support costs. Maximize desktop

More information

Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide

Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide Symantec Backup Exec 12.5 for Windows Servers Quick Installation Guide 13897290 Installing Backup Exec This document includes the following topics: System requirements Before you install About the Backup

More information

Ad Hoc Transfer Plug-in for Outlook Installation Guide

Ad Hoc Transfer Plug-in for Outlook Installation Guide IPSWITCH TECHNICAL BRIEF Ad Hoc Transfer Plug-in for Outlook Installation Guide In This Document Installing the Ad Hoc Transfer Plug-in for Outlook...1 Silent Install for Ad Hoc Transfer Plug-in for Outlook...3

More information

NetSupport Manager v11

NetSupport Manager v11 Remote Support For Any Environment NetSupport Manager v11 NetSupport Manager has been helping organizations optimize the delivery of their IT support services since 1989 and while the use of Remote Control

More information

Agency Pre Migration Tasks

Agency Pre Migration Tasks Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required

More information

GFI Product Manual. Deployment Guide

GFI Product Manual. Deployment Guide GFI Product Manual Deployment Guide http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of

More information

Using WMI Scripts with BitDefender Client Security

Using WMI Scripts with BitDefender Client Security Using WMI Scripts with BitDefender Client Security Whitepaper Copyright 2009 BitDefender; Table of Contents 1. Introduction... 3 2. Key Benefits... 4 3. Available WMI Script Templates... 5 4. Operation...

More information

MS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy. Course Objectives. Required Exam(s) Price.

MS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy. Course Objectives. Required Exam(s) Price. MS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy Discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy. In this four-day instructor

More information

Implementing HIPAA Compliance with ScriptLogic

Implementing HIPAA Compliance with ScriptLogic Implementing HIPAA Compliance with ScriptLogic A ScriptLogic Product Positioning Paper By Nick Cavalancia 1.800.424.9411 www.scriptlogic.com Table of Contents INTRODUCTION... 3 HIPAA BACKGROUND... 3 ADMINISTRATIVE

More information

DCA Local Print Agent Push Install

DCA Local Print Agent Push Install DCA Local Print Agent Push Install PageTrac Support DCA Local Print Agent Push Install System Requirements Each workstation on which you install Local Print Agent must have the following: Windows operating

More information

THE COMPLETE VIEWER FOR MS PROJECT. Deployment White Paper

THE COMPLETE VIEWER FOR MS PROJECT. Deployment White Paper THE COMPLETE VIEWER FOR MS PROJECT Seavus DOOEL 2010 2 TABLE OF CONTENTS 1 DEPLOYMENT OPTIONS... 3 1.1 SINGLE USER INSTALLATION... 3 1.2 CONCURRENT USER INSTALLATION... 4 1.3 SINGLE COMPANY KEY INSTALLATION...

More information

Kaseya 2. User Guide. Version R8. English

Kaseya 2. User Guide. Version R8. English Kaseya 2 Discovery User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend

More information

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main

More information

Small Business Server Part 1

Small Business Server Part 1 Small Business Server Part 1 Presented by : Robert Crane BE MBA MCP director@ciaops.com Computer Information Agency http://www.ciaops.com Agenda Week 1 What is SBS / Setup Week 2 Using & configuring SBS

More information

This document is intended to make you familiar with the ServersCheck Monitoring Appliance

This document is intended to make you familiar with the ServersCheck Monitoring Appliance ServersCheck Monitoring Appliance Quick Overview This document is intended to make you familiar with the ServersCheck Monitoring Appliance Although it is possible, we highly recommend not to install other

More information

UserLock advanced documentation

UserLock advanced documentation UserLock advanced documentation 1. Agent deployment with msi package or with the UserLock deployment module The UserLock deployment module doesn t deploy the msi package. It just transfers the agent file

More information

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet CONTENTS Installation System requirements SQL Server setup Setting up user accounts Authentication mode Account options Import from

More information

System Management. What are my options for deploying System Management on remote computers?

System Management. What are my options for deploying System Management on remote computers? Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What

More information

APPENDIX I Basic Windows NT Server 4.0 Installation and Configuration

APPENDIX I Basic Windows NT Server 4.0 Installation and Configuration Basic Windows NT Server 4.0 Installation and Configuration Windows NT 4.0 (English version) Installation The first step of the installation is to install the English Windows NT Server 4.0 to the file server

More information

Propalms TSE Deployment Guide

Propalms TSE Deployment Guide Propalms TSE Deployment Guide Version 7.0 Propalms Ltd. Published October 2013 Overview This guide provides instructions for deploying Propalms TSE in a production environment running Windows Server 2003,

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows : Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows

More information

Contents. Platform Compatibility. Directory Connector SonicWALL Directory Services Connector 3.1.7

Contents. Platform Compatibility. Directory Connector SonicWALL Directory Services Connector 3.1.7 Directory Connector SonicWALL Directory Services Connector 3.1.7 Contents Platform Compatibility... 1 New Features... 2 Known Issues... 3 Resolved Issues... 4 Overview... 7 About SonicWALL Single Sign-On

More information

Remote Support Solutions

Remote Support Solutions CompareScope Remote Support Solutions May 2013 commissioned by manage IT complexity simply Executive Overview This CompareScope paper looks at three solutions designed to facilitate remote administration

More information

Matisse Installation Guide for MS Windows. 10th Edition

Matisse Installation Guide for MS Windows. 10th Edition Matisse Installation Guide for MS Windows 10th Edition April 2004 Matisse Installation Guide for MS Windows Copyright 1992 2004 Matisse Software Inc. All Rights Reserved. Matisse Software Inc. 433 Airport

More information

SMART Sync 2011. Windows operating systems. System administrator s guide

SMART Sync 2011. Windows operating systems. System administrator s guide SMART Sync 2011 Windows operating systems System administrator s guide Trademark notice SMART Sync, smarttech and the SMART logo are trademarks or registered trademarks of SMART Technologies ULC in the

More information

NetWrix USB Blocker Version 3.6 Quick Start Guide

NetWrix USB Blocker Version 3.6 Quick Start Guide NetWrix USB Blocker Version 3.6 Quick Start Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Getting Started...5 3.1.

More information

Blackbaud FundWare Installation and Update Guide VERSION 7.60, JULY 2010

Blackbaud FundWare Installation and Update Guide VERSION 7.60, JULY 2010 Blackbaud FundWare Installation and Update Guide VERSION 7.60, JULY 2010 Blackbaud FundWare Installation and Update Guide USER GUIDE HISTORY Date Changes November 2000 June 2001 August 2001 January 2002

More information

LOCAL PRINT AGENT OVERVIEW

LOCAL PRINT AGENT OVERVIEW LOCAL PRINT AGENT OVERVIEW The Local Print Agent is used to collect information from local printing devices. The technology of the local device determines the information reported to the Local Print Agent

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

Fiery E100 Color Server. Welcome

Fiery E100 Color Server. Welcome Fiery E100 Color Server Welcome 2011 Electronics For Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45098226 27 June 2011 WELCOME 3 WELCOME This Welcome

More information

3. Where can I obtain the Service Pack 5 software?

3. Where can I obtain the Service Pack 5 software? Reasons to upgrade: 1. What are the features of BlackBerr y Enterprise Server 4.1 Service Pack 5? What issues does Service Pack 5 address? Are there any current known issues with Service Pack 5? The BlackBerry

More information

FileMaker Pro 13. Using a Remote Desktop Connection with FileMaker Pro 13

FileMaker Pro 13. Using a Remote Desktop Connection with FileMaker Pro 13 FileMaker Pro 13 Using a Remote Desktop Connection with FileMaker Pro 13 2007 2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker

More information

HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE

HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means

More information

THE POWER OF GROUP POLICY

THE POWER OF GROUP POLICY Specops Software presents: THE POWER OF GROUP POLICY By Danielle Ruest and Nelson Ruest The Power of Group Policy... 3 The Inner Workings of GPOs... 4 The Ideal Tool for Systems Management... 7 Your Next

More information

This document details the procedure for installing Layer8 software agents and reporting dashboards.

This document details the procedure for installing Layer8 software agents and reporting dashboards. Quick Start Guide This document details the procedure for installing Layer8 software agents and reporting dashboards. Deployment to data analysis takes approximately 15 minutes. If you wish to deploy via

More information

AppSense Environment Manager. Enterprise Design Guide

AppSense Environment Manager. Enterprise Design Guide Enterprise Design Guide Contents Introduction... 3 Document Purpose... 3 Basic Architecture... 3 Common Components and Terminology... 4 Best Practices... 5 Scalability Designs... 6 Management Server Scalability...

More information

Overview... 2. Using the Secure Desktop Agent... 4. Troubleshooting... 10

Overview... 2. Using the Secure Desktop Agent... 4. Troubleshooting... 10 Overview... 2 Installing... 2 Step 1: Download... 2 Step 2: Install... 2 Step 3: Sign In... 3 Step 4: That's It!... 3 Minimum System Requirements:... 3 Using the Secure Desktop Agent... 4 Accessing & Login

More information

Test Case 3 Active Directory Integration

Test Case 3 Active Directory Integration April 12, 2010 Author: Audience: Joe Lowry and SWAT Team Evaluator Test Case 3 Active Directory Integration The following steps will guide you through the process of directory integration. The goal of

More information

SyncLockStatus Evaluator s Guide

SyncLockStatus Evaluator s Guide SyncLockStatus Evaluator s Guide 2011 Table of Contents Introduction... 2 System Requirements... 2 Required Microsoft Components... 2 Contact Information... 3 SyncLockStatus Architecture... 3 SyncLockStatus

More information

Installing OneStop Reporting Products

Installing OneStop Reporting Products Installing OneStop Reporting Products Contents 1 Introduction 2 Product Overview 3 System Requirements 4 Deployment 5 Installation 6 Appendix 2010 OneStop Reporting http://www.onestopreporting.com support@onestopreporting.com

More information

Reporting works by connecting reporting tools directly to the database and retrieving stored information from the database.

Reporting works by connecting reporting tools directly to the database and retrieving stored information from the database. Print Audit 6 - Step by Step Walkthrough IMPORTANT: READ THIS BEFORE PERFORMING A PRINT AUDIT 6 INSTALLATION Print Audit 6 is a desktop application that you must install on every computer where you want

More information

System Center Configuration Manager

System Center Configuration Manager System Center Configuration Manager Software Update Management Guide Friday, 26 February 2010 Version 1.0.0.0 Baseline Prepared by Microsoft Copyright This document and/or software ( this Content ) has

More information

Getting Started with RES ONE Automation 2015

Getting Started with RES ONE Automation 2015 Getting Started with RES ONE Automation 2015 Disclaimer Whilst every care has been taken by RES Software to ensure that the information contained in this document is correct and complete, it is possible

More information

Server Management 2.0

Server Management 2.0 Server Management 2.0 Installation and Configuration Guide Server Management 2.0 and Higher May 2008 . unisys imagine it. done. Server Management 2.0 Installation and Configuration Guide Server Management

More information

AVG 8.5 Anti-Virus Network Edition

AVG 8.5 Anti-Virus Network Edition AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective

More information

FileMaker Server 8. Administrator s Guide

FileMaker Server 8. Administrator s Guide FileMaker Server 8 Administrator s Guide 1994-2005 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc.,

More information

Smart Cloud Integration Pack. For System Center Operation Manager. v1.1.0. User's Guide

Smart Cloud Integration Pack. For System Center Operation Manager. v1.1.0. User's Guide Smart Cloud Integration Pack For System Center Operation Manager v1.1.0 User's Guide Table of Contents 1. INTRODUCTION... 6 1.1. Overview... 6 1.2. Feature summary... 7 1.3. Supported Microsoft System

More information